Security Techieindex



       Posted by 2016-07-18

User Data Stolen in Ubuntu Forums Breach

Canonical informed users on Friday that the Ubuntu Forums website was breached after a hacker exploited a known vulnerability in one of the add-ons installed on the vBulletin-powered site. read more More ...

       Posted by 2016-07-17

Hackers claim to launched DDoS attack that crashed Pokemon Go servers

Shortly after Pokemon Go launched in 26 new countries, the servers crashed; while sluggish and or unresponsive servers shouldn’t surprise anyone, given the app’s popularity even before the added audience from countries across the globe, a hacking collective took credit for the attack.A group More ...

       Posted by 2016-07-16

Android Apps Fool Hundreds of Thousands With Empty Promises

Nearly one million Android users have fallen victims to eight fake applications that falsely claimed to help them gain more followers on social networks, but instead stole their information and money. read more More ...

       Posted by 2016-07-15

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance. Dubbed Riffle, the new system taps the same onion encryption technique after which Tor is named, but it adds two others as well. First is what s called More ...

       Posted by 2016-07-15

Fake Pokemon Go game locks phone, secretly drives porn ad clicks

A newly discovered fake Pokemon Go game will actually lock your phone and then secretly run in the background, clicking on porn ads. Security firm ESET found it on Google Play and its called Pokemon Go Ultimate. However, once downloaded, the app itself doesn’t even pretend to offer anything re More ...


       Posted by 2015-02-20

Safe & Secure Campus Symposium

Here is an incident on a campus every week. These tragic incidents at schools and universities have elevated the need for school administrators, security personnel, community leaders, emergency manage More ...

       Posted by 2015-02-18

Security Professionals Go "Back to the Future..."

This year we will explore the theme Back to the Future: What Will the Future of Information Security Look Like? It's clear that today's information security practitioners require a unique blend of a v More ...

       Posted by 2015-02-18

Gartner Security & Risk Management Summit

In order to achieve success, security and risk leaders must embrace new approaches to digital business while maintaining proven control architecture that mitigates enterprise risk. More ...

Press Releases

       Posted by 2015-02-20

Information regarding a publication mentioning a hacking of SIM card encryption keys

AMSTERDAM, Netherlands, Feb. 20, 2015 (GLOBE NEWSWIRE) -- A publication reported yesterday that in 2010 and 2011, a joint unit composed of operatives from the British GCHQ (Government Communications H

White paper

       Posted by 2015-11-03

Special Webcast: How NERC and CIP are making a difference - November 3, 2015 11:00am US Eastern

Speakers: Tim ConwayJoin Tim Conway from SANS as he provides a balanced perspective on the direction that the NERC CIP Standards are moving in and the effects they will have on the Reliability of the More...

       Posted by 2015-11-03

Special Webcast: 2015 Cloud Security & Risk Benchmarks Report - November 3, 2015 1:00pm US Eastern

Speakers: Brandon Cook and John PescatoreThe number of cloud applications in use at enterprises has seen a meteoric 111% rise in the last two years, from an average 545 in 2013 to 1,154 in Q3 2015. More...

       Posted by 2015-10-30

Ask The Expert Webcast: Security Best Practices for Implementing Network Segmentation in a Healthcare Environment - October 30, 2015 1:00pm US Eastern

Speakers: James Tarala and Matt MellenIn October 2015 the Center for Internet Security will release an updated version of the Critical Security Controls which outline cyber hygiene best practices for More...

       Posted by 2015-10-29

WhatWorks Webcast: What Works for Fannie Maes Deputy CISO to Assess Monitor Third Party Cybersecurity with BitSight - October 29, 2015 1:00pm US Eastern

Speakers: John Pescatore and Christopher PorterMany recent breaches have exploited security weaknesses in third party vendors and suppliers to attack business and government agencies. During this SANS More...

       Posted by 2015-10-28

Analyst Webcast: What Are Their Vulnerabilities? A SANS Continuous Monitoring Survey - October 28, 2015 1:00pm US Eastern

Speakers: David Hoelzer, Javvad Malik, Arabella Hallawell, Mark Painter and Ted GaryContinuous monitoring is growing in use, according to the 2014 SANS Survey on the Critical Security Controls. In it More...

To sign up or login for companies and Candidate please click on    Login

Post a Job     Post

Get top stories delivered daily.

Opinion Poll 
Is HBACA is helpfull?
  Yes  t
  Can't Say

view results